全文获取类型
收费全文 | 81948篇 |
免费 | 1370篇 |
国内免费 | 921篇 |
专业分类
化学 | 28971篇 |
晶体学 | 1043篇 |
力学 | 6481篇 |
综合类 | 41篇 |
数学 | 27305篇 |
物理学 | 20398篇 |
出版年
2024年 | 76篇 |
2023年 | 213篇 |
2022年 | 375篇 |
2021年 | 417篇 |
2020年 | 409篇 |
2019年 | 400篇 |
2018年 | 8731篇 |
2017年 | 8463篇 |
2016年 | 5411篇 |
2015年 | 1101篇 |
2014年 | 837篇 |
2013年 | 1299篇 |
2012年 | 4295篇 |
2011年 | 9948篇 |
2010年 | 5500篇 |
2009年 | 5797篇 |
2008年 | 6372篇 |
2007年 | 8100篇 |
2006年 | 1319篇 |
2005年 | 1960篇 |
2004年 | 1976篇 |
2003年 | 2145篇 |
2002年 | 1375篇 |
2001年 | 1053篇 |
2000年 | 848篇 |
1999年 | 634篇 |
1998年 | 528篇 |
1997年 | 480篇 |
1996年 | 441篇 |
1995年 | 371篇 |
1994年 | 321篇 |
1993年 | 272篇 |
1992年 | 249篇 |
1991年 | 237篇 |
1990年 | 212篇 |
1989年 | 168篇 |
1988年 | 159篇 |
1987年 | 146篇 |
1986年 | 130篇 |
1985年 | 117篇 |
1984年 | 96篇 |
1983年 | 65篇 |
1982年 | 73篇 |
1981年 | 65篇 |
1980年 | 52篇 |
1979年 | 55篇 |
1978年 | 49篇 |
1976年 | 40篇 |
1973年 | 39篇 |
1914年 | 36篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
121.
Characterizing sets of permutations whose associated quasisymmetric function is symmetric and Schur-positive is a long-standing problem in algebraic combinatorics. In this paper, we present a general method to construct Schur-positive sets and multisets, based on geometric grid classes and the product operation. Our approach produces many new instances of Schur-positive sets and provides a broad framework that explains the existence of known such sets that until now were sporadic cases. 相似文献
122.
XOR-based visual cryptography scheme (XVCS) was proposed to solve the poor visual quality problem without darkening the background in the reconstructed secret image. However, investigations on XVCS are not sufficient. In this paper, we focus on the traditional model of VCS for general access structures and exploit some extended capabilities for XVCS. Our main contributions are: (1) we put forward constructions of perfect contrast XVCS using the linear algebraic technique without any assumptions such as participants may carry multiple shares or prior information about the shares are to be submitted during the secret reconstruction phase; (2) for some restricted access structures, we achieve perfect contrast and perfect pixel expansion, namely both 1, which is impossible for any OR-based visual cryptography scheme (OVCS); (3) for general access structures, we achieve perfect contrast with smaller pixel expansion compared with many of the results in the literature; (4) Theoretical analysis on the proposed constructions are provided, as well as extensive experimental results and comparisons for demonstrating the effectiveness and advantages of our constructions. 相似文献
123.
Keshab Chandra Bakshi 《Proceedings Mathematical Sciences》2017,127(1):117-132
In this paper, we examine bases for finite index inclusion of II1 factors and connected inclusion of finite dimensional C ?-algebras. These bases behave nicely with respect to basic construction towers. As applications we have studied automorphisms of the hyperfinite II1 factor R which are ‘compatible with respect to the Jones’ tower of finite dimensional C ?-algebras’. As a further application, in both cases we obtain a characterization, in terms of bases, of basic constructions. Finally we use these bases to describe the phenomenon of multistep basic constructions (in both the cases). 相似文献
124.
A thermodynamically consistent model for incompressible two-phase flows with phase transitions is considered mathematically. The model is based on first principles, i.e., balance of mass, momentum and energy. In the isothermal case, this problem is analysed to obtain local well-posedness, stability of non-degenerate equilibria, and global existence and convergence to equilibria of solutions which do not develop singularities. 相似文献
125.
This paper presents a matrix-analytic solution for second-order Markov fluid models (also known as Markov-modulated Brownian motion) with level-dependent behavior. A set of thresholds is given that divide the fluid buffer into homogeneous regimes. The generator matrix of the background Markov chain, the fluid rates (drifts) and the variances can be regime dependent. The model allows the mixing of second-order states (with positive variance) and first-order states (with zero variance) and states with zero drift. The behavior at the upper and lower boundary can be reflecting, absorbing, or a combination of them. In every regime, the solution is expressed as a matrix-exponential combination, whose matrix parameters are given by the minimal nonnegative solution of matrix quadratic equations that can be obtained by any of the well-known solution methods available for quasi birth death processes. The probability masses and the initial vectors of the matrix-exponential terms are the solutions of a set of linear equations. However, to have the necessary number of equations, new relations are required for the level boundary behavior, relations that were not needed in first-order level dependent and in homogeneous (non-level-dependent) second-order fluid models. The method presented can solve systems with hundreds of states and hundreds of thresholds without numerical issues. 相似文献
126.
There is a gap in the proofs of both Propositions 3 and 4 in the correspondence “Queue-Proportional Rate Allocation with Per-Link Information in Multihop Wireless Networks,” previously published in the Queueing Systems (see Li and Srikant 2016). We filled this gap in the proofs for the multihop networks (see Li and Srikant in Queueing Syst 84:203–210, 2016), where each route at most has two links. In this note, we completely fill the gap in the proofs in our original paper (see Li and Srikant in Queueing Syst 83:329–359, 2016). 相似文献
127.
Xiaohui Liu 《Computational Statistics》2017,32(4):1395-1410
Tukey depth function is one of the most famous multivariate tools serving robust purposes. It is also very well known for its computability problems in dimensions \(p \ge 3\). In this paper, we address this computing issue by presenting two combinatorial algorithms. The first is naive and calculates the Tukey depth of a single point with complexity \(O\left( n^{p-1}\log (n)\right) \), while the second further utilizes the quasiconcave of the Tukey depth function and hence is more efficient than the first. Both require very minimal memory and run much faster than the existing ones. All experiments indicate that they compute the exact Tukey depth. 相似文献
128.
Non-negative matrix factorization (NMF) is a technique of multivariate analysis used to approximate a given matrix containing non-negative data using two non-negative factor matrices that has been applied to a number of fields. However, when a matrix containing non-negative data has many zeroes, NMF encounters an approximation difficulty. This zero-inflated situation occurs often when a data matrix is given as count data, and becomes more challenging with matrices of increasing size. To solve this problem, we propose a new NMF model for zero-inflated non-negative matrices. Our model is based on the zero-inflated Tweedie distribution. The Tweedie distribution is a generalization of the normal, the Poisson, and the gamma distributions, and differs from each of the other distributions in the degree of robustness of its estimated parameters. In this paper, we show through numerical examples that the proposed model is superior to the basic NMF model in terms of approximation of zero-inflated data. Furthermore, we show the differences between the estimated basis vectors found using the basic and the proposed NMF models for \(\beta \) divergence by applying it to real purchasing data. 相似文献
129.
Ferdinand Ihringer 《Journal of Algebraic Combinatorics》2017,46(2):263-274
We describe a general construction of strongly regular graphs from the collinearity graph of a finite classical polar spaces of rank at least 3 over a finite field of order q. We show that these graphs are non-isomorphic to the collinearity graphs and have the same parameters. For most of these parameters, the collinearity graphs were the only known examples, and so many of our examples are new. 相似文献
130.
In this paper, a new price is given to the online decision maker at the beginning of each day. The trader must decide how many items to purchase according to the current price. We present three variants and an online algorithm based on cost function. The competitive ratio of the online algorithm is given for each variant, which is a performance measure of an online algorithm. More importantly, we show that the online algorithm is optimal. 相似文献